December 15, 2022 By Hanna Linder 2 min read

A cybersecurity attack can be devastating to any company, but improving your software supply chain can significantly minimize your risk of being compromised.

With the rapid increase in the adoption and use of Open Source Software (OSS) in modern application development, it is important to perform additional diligence. All of the components of your software supply chain need a thorough inspection. IBM is collaborating in the OSS ecosystem with other industry leaders and key OSS communities to address a broad range of security issues that have developed over time. These issues have appeared gradually, and it will take time to create new security best practices to address these challenges.

One of the many ways that IBM is collaborating with these OSS communities is by being an active member of the Open Source Security Foundation (OpenSSF), an initiative developed and launched by the Linux Foundation.

The OpenSSF describes itself as “… a cross-industry organization that brings together the industry’s most important open source security initiatives and the individuals and companies that support them. The OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.” IBM is one of the founding members of the organization, and Jamie Thomas, General Manager, Systems Strategy and Development at IBM, serves as a Board Chair at the OpenSSF.

IBM Technology Services

Clients can improve their security posture by leveraging several valuable products and services from IBM. IBM Technology Services provide clients with several options, including open source security vulnerability assessments and risk mitigation assistance.

The IBM Technology Services Open Source Software team has capabilities on many popular community and commercial products supporting business digital transformation and application modernization. We can offer a range of services helping clients to design, deploy and optimize open source technologies.

Security is not a linear or finite journey; rather, it is a continuous, evolving process. Clients need to take a proactive role in addressing their security today, as waiting for a threat to materialize can sometimes be too late.

How do we help our clients address their overall security?

We integrate security into all of our client engagements. When providing a client with OSS services, we make sure that the OSS download site is valid and we verify the Software Bill of Materials (SBOM) when it is available, meaning that any download links we provide are verified that they are valid and safe. In addition, we can also perform vulnerability assessments and mitigations for or with a client as a separate service.

By using IBM Technology Lifecycle Services for Open Source Technology Services, clients can be confident that they are benefiting from a worldwide community that is constantly evaluating for the presence of bugs and critical vulnerabilities. Other important features include focusing on integrating DevSecOps as a key element in software development.

To learn more about how we can help you, contact technologyservices@ibm.com.

Was this article helpful?
YesNo

More from Cloud

Fortressing the digital frontier: A comprehensive look at IBM Cloud network security services

6 min read - The cloud revolution has fundamentally transformed how businesses operate. Its superior scalability, agility and cost-effectiveness have made it the go-to platform for organizations of all sizes. However, this shift to the cloud has introduced a new landscape of ever-evolving security threats. Data breaches and cyberattacks continue to hit organizations, making robust cloud network security an absolute necessity. IBM®, a titan in the tech industry, recognizes this critical need, provides a comprehensive suite of tools and offers unmatched expertise to fortify…

How well do you know your hypervisor and firmware?

6 min read - IBM Cloud® Virtual Private Cloud (VPC) is designed for secured cloud computing, and several features of our platform planning, development and operations help ensure that design. However, because security in the cloud is typically a shared responsibility between the cloud service provider and the customer, it’s essential for you to fully understand the layers of security that your workloads run on here with us. That’s why here, we detail a few key security components of IBM Cloud VPC that aim…

New IBM study: How business leaders can harness the power of gen AI to drive sustainable IT transformation

3 min read - As organizations strive to balance productivity, innovation and environmental responsibility, the need for sustainable IT practices is even more pressing. A new global study from the IBM Institute for Business Value reveals that emerging technologies, particularly generative AI, can play a pivotal role in advancing sustainable IT initiatives. However, successful transformation of IT systems demands a strategic and enterprise-wide approach to sustainability. The power of generative AI in sustainable IT Generative AI is creating new opportunities to transform IT operations…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters